Featured posts
In most cases, fake Flash updates pushing malware are not very stealthy. In recent years, such imposters have often been…
CSX also adds new Virtual Cyber Academy training subscription and CSXP exam Global technology and cybersecurity association ISACA, creator of…
Auditors are increasingly being required to audit cybersecurity processes, policies and tools to provide assurance that their enterprise has appropriate…
Mike Hooper, Director of Digital Transformation (APAC) at OpenText A day in the life of the intelligent and connected enterprise…
The NSW Government is taking an integrated approach to preventing and responding to cyber security threats across the state, to…
NIST Requests Public Comments on Draft NISTIR 8228 NIST has released Draft NIST Internal Report (NISTIR) 8228, Considerations for Managing…
The proliferation of wireless and bring your own device (BYOD) endpoints means corporate networks depend more on wireless networks. Securing…
NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…
Where are the hordes of cold and scary European privacy policy enforcers? Can you see them slowly roaming and moaning…
Digital Transformation Barometer finds better security needed to harness the positive potential of AI and mitigate risks of malicious attacks…